


default search action
ICMCIS 2015: Cracow, Poland
- International Conference on Military Communications and Information Systems, ICMCIS 2015, Cracow, Poland, May 18-19, 2015. IEEE 2015, ISBN 978-8-3934-8481-2

- Thomas Kudla, Markus Esch, Daniel Ota, Gerhard Schwarz:

An open process for software development in classified environments as prerequisite for military app stores. 1-9 - Jacek Jarmakiewicz

, Krzysztof Maslanka
, Krzysztof Parobczak:
Development of cyber security testbed for critical infrastructure. 1-10 - Wojciech Bednarczyk, Piotr Gajewski

:
Performance of distributed clustering with weighted optimization algorithm for MANET Cognitive Radio. 1-5 - Bart Scheers, Djamel Teguig, Vincent Le Nir

:
Wideband spectrum sensing technique based on Goodness-of-Fit testing. 1-6 - Hanna Werker, Stefan Couturier, Daniel Rauschen, Marc Adrat, Markus Antweiler:

Analysis of a modified Switchable Bayesian Learning Automaton for Cognitive Radio. 1-5 - Arild Bergh

:
Distributing the disruption. 1-6 - Raymond Haakseth, Nils Agne Nordbotten, Oyvind Jonsson, Bengt Kristiansen:

A high assurance cross-domain guard for use in Service-Oriented Architectures. 1-8 - Grzegorz Szmit, Jerzy Lopatka

:
Optimization of Cognitive Radio networks performance using policies definition. 1-7 - Sara Örn Tengstrand, Sara Linder, Karina M. Fors, Ulf Sterner:

Capacity benefits of airborne nodes in ad hoc networks with broadcast traffic. 1-6 - Frank T. Johnsen, Trude Hafsøe Bloebaum, Dag Ove Eggum:

Efficient SOAP messaging for Android. 1-9 - Djamel Teguig, Bart Scheers, Vincent Le Nir

, François Horlin
:
Consensus algorithms for distributed spectrum sensing based on goodness of fit test in cognitive radio networks. 1-5 - Wim Mees, Thibault Debatty:

An attempt at defining cyberdefense situation awareness in the context of command & control. 1-9 - Kyrre Wahl Kongsgård, Nils Agne Nordbotten, Stian Fauskanger:

Policy-based labelling: A flexible framework for trusted data labelling. 1-10 - Ewa Idzikowska:

Faults detection schemes for PP-2 cipher. 1-4 - Christoph Barz, Florian Quinkert:

Advanced security gateways for heterogeneous tactical ad hoc networks. 1-6 - Piotr Lubkowski, Mariann Hauge, Lars Landmark, Christoph Barz, Peter Sevenich:

On improving connectivity and network efficiency in a heterogeneous military environment. 1-9 - Joanna Sliwa, Tomasz Podlasek, Robert Matyszkiel, Boguslaw Grochowina:

Efficiency of the Single Sign On mechanism in a tactical network environment. 1-7 - Espen Flydahl, Mariann Hauge, Lars Landmark:

On the performance of packet-pair based path capacity estimation in wireless Ad Hoc networks. 1-9 - Leopoldo Santos, Mario de la Fuente Martin, Juan Jose Perez, Carlos Rodríguez-Solano, Miguel-Ángel Sicilia

:
Representing multi-national rules of engagement using ontologies and rules as constraints for courses of action. 1-5 - Adam Kozakiewicz, Krzysztof Lasota:

Secure DRM mechanism for offline applications. 1-8 - Robert Wicik, Rafal Gliwa, Piotr Komorowski:

Cryptanalysis of alternating step generators. 1-6 - Wolfgang Koch, Felix Govaers:

Accumulated state densities and their use in decorrelated track-to-track fusion. 1-9 - Baher Mawlawi, Jean-Baptiste Dore

, Vincent Berg:
Optimizing contention based access methods for FBMC waveforms. 1-6 - Feten Slimeni, Bart Scheers, Zied Chtourou, Vincent Le Nir

:
Jamming mitigation in cognitive radio networks using a modified Q-learning algorithm. 1-7 - Joanna Glowacka

, Marek Amanowicz
, Marcin Glowacki:
Robustness of trust-based protection (TUBE) scheme to reputation attacks in military mobile ad-hoc networks. 1-10 - Patrik Eliardsson, Erik Axell

, Peter F. Stenumgaard, Kia Wiklundh, Bjorn Johansson, Börje Asp:
Military HF communications considering unintentional platform-generated electromagnetic interference. 1-6 - James Nightingale, Qi Wang, José M. Alcaraz Calero

, Ian Owens
, Christos Grecos:
Enhancing visual communications capabilities in tactical networks. 1-9 - Mikko Kiviharju:

Attribute pooling for Cryptographic Access Control. 1-12 - Rafal Piotrowski, Joanna Sliwa:

Cyberspace situational awarness in national security system. 1-6 - Reginald Ford, Bjorn Jervell Hansen, David Hanz, Sven Kuehne, Mark Last, Vahid Mojtahedzadeh, Dariusz Nogalski

, Leopoldo Santos, Fulya Tuncer, Michael Wunder:
Bridging Semantic Interoperability gaps with SILF. 1-11 - Topi Tuukkanen

, Jukka Anteroinen:
Framework to develop military operational understanding of cognitive radio. 1-9 - Jan Nilsson, Ulf Sterner:

Performance of MPR-based broadcast methods in mobile ad hoc networks for rural terrains. 1-7 - Janusz Szmidt, Przemyslaw Dabrowski:

The construction of nonlinear feedback shift registers of small orders. 1-4 - Kimmo Heinäaro:

Cyber attacking tactical radio networks. 1-6 - Feten Slimeni, Bart Scheers, Zied Chtourou:

Security threats in military cognitive radio networks. 1-10 - Michal Kruczkowski, Ewa Niewiadomska-Szynkiewicz

, Adam Kozakiewicz:
Cross-layer analysis of malware datasets for malicious campaigns identification. 1-7 - Pierre Simon, Norbert Bret:

Technology-agnostic traffic engineering in a multinational network. 1-6 - Ronggong Song, J. David Brown, Helen Tang, Mazda Salmanian:

Secure and efficient routing by Leveraging Situational Awareness Messages in tactical edge networks. 1-8 - Vincent Le Nir

, Bart Scheers:
Evaluation of open-source software frameworks for high fidelity simulation of cognitive radio networks. 1-6 - Ole Ingar Bentstuen, Petter Kristiansen:

Towards a transport network for FMN based on the PCN concept. 1-6 - Frank T. Johnsen, Trude Hafsøe Bloebaum, Kristoffer R. Karud:

Recommendations for increased efficiency of Web services in the tactical domain. 1-11 - Wojciech Bednarczyk, Jerzy Dolowski

, Jaroslaw Michalak
:
An efficiency of broadcast mechanisms based on Cluster Heads in clusterized radio network. 1-6 - Federico Mancini, Anders Fongen:

Ephemeral classification of mobile terminals. 1-12 - Harri Saarnisaari:

Analysis of a CFAR correlation radiometer. 1-5 - Jacek Jarmakiewicz

, Tomasz Podlasek:
Design and implementation of multilevel security subsystem based on XACML and WEB services. 1-8 - Philipp Steinmetz:

Measuring and limiting the covert channel risk of XML document transmission. 1-9 - Heshan Du

, Natasha Alechina
, Glen Hart, Michael Jackson:
A tool for matching crowd-sourced and authoritative geospatial data. 1-8 - Kamil Gleba, Henryk Wiacek, Robert Goniacz, Joanna Sliwa:

Distribution and interpretation of geo-referenced events for the purpose of road traffic shaping. 1-7 - Michael Gerz, Melissa Mulikita, Nico Bau, Fahrettin Gökgöz:

The MIP Information Model - A semantic reference for Command & Control. 1-11 - Stefan Couturier, Jaroslaw Krygier

, Ole Ingar Bentstuen, Vincent Le Nir
:
Challenges for network aspects of Cognitive Radio. 1-10 - Norman Jansen, Daniel Krämer, Christoph Barz, Julia Niewiejska, Marc Spielmann:

Middleware for coordinating a tactical router with SOA services. 1-7 - Ichrak Amdouni, Cédric Adjih, Thierry Plesse:

Network coding in military wireless ad hoc and sensor networks: Experimentation with GardiNet. 1-9

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














